(57) is a non-deterministic public-key encryption system that uses a mathematical operation equivalent to a power in the [summary] finite field, to generate a public key from the private key. Thus, the intruder must calculate the logarithm of the finite field. To generate the (R) random initialization key to perform encryption. So as to generate an initial value for the pseudo-random binary mixture generator (K), raised to the power (E) public key of the recipient of the message (1), the occurrence of known initial further (R) this random initialization key By the power state of the vessel (a0), and is calculated using to (2) open key (Q). And generates ciphertext C from plaintext P by the clock the mixture generator from the initial value K, is combined with the plaintext P and the output keystream. I Serve open key (Q) in the ciphertext before transmission. Extracts open key (Q) to perform the decryption, and power private key of the message recipient (D) In this, the calculation is used to set the initial value of the mixture generator (K) to. The clock control the mixture generator, a combination ciphertext and the output key stream and (C), to generate the plaintext (P). I can be implemented in software on general-purpose processors or special-purpose hardware to the present invention.
展开▼